Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
cda4cb83
Commit
cda4cb83
authored
Jul 02, 2019
by
GitLab Bot
Browse files
Options
Browse Files
Download
Plain Diff
Automatic merge of gitlab-org/gitlab-ce master
parents
82aa7c70
02ad0c2f
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
46 additions
and
1 deletion
+46
-1
doc/user/project/clusters/serverless/index.md
doc/user/project/clusters/serverless/index.md
+46
-1
No files found.
doc/user/project/clusters/serverless/index.md
View file @
cda4cb83
...
...
@@ -94,10 +94,55 @@ adding an existing installation of Knative.
It is also possible to use GitLab Serverless with an existing Kubernetes
cluster which already has Knative installed.
Simply
:
You must do the following
:
1.
Follow the steps to
[
add an existing Kubernetes cluster
](
../index.md#adding-an-existing-kubernetes-cluster
)
.
1.
Ensure GitLab can manage Knative:
-
For a non-GitLab managed cluster, ensure that the service account for the token
provided can manage resources in the
`serving.knative.dev`
API group.
-
For a GitLab managed cluster,
GitLab uses a service account with the
`edit`
cluster role. This account needs
the ability to manage resources in the
`serving.knative.dev`
API group.
We suggest you do this with an
[
aggregated ClusterRole
](
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
)
adding rules to the default
`edit`
cluster role:
First, save the following YAML as
`knative-serving-only-role.yaml`
:
```yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: knative-serving-only-role
labels:
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups:
- serving.knative.dev
resources:
- configurations
- configurationgenerations
- routes
- revisions
- revisionuids
- autoscalers
- services
verbs:
- get
- list
- create
- update
- delete
- patch
- watch
```
Then run the following command:
```bash
kubectl apply -f knative-serving-only-role.yaml
```
1.
Follow the steps to deploy
[
functions
](
#deploying-functions
)
or
[
serverless applications
](
#deploying-serverless-applications
)
onto your
cluster.
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment